Villain-Unleashed new features demo 2023

Поділитися
Вставка
  • Опубліковано 10 гру 2024

КОМЕНТАРІ • 102

  • @0dayCTF
    @0dayCTF Рік тому +12

    You're always making incredible projects, love what you do !

  • @elmehdioubouhouch
    @elmehdioubouhouch Рік тому +1

    A new subscriber for this dude here from Morocco

  • @elmehdioubouhouch
    @elmehdioubouhouch Рік тому +1

    You are amazing man i love the project keep it up

  • @igornemorssa2936
    @igornemorssa2936 7 місяців тому

    Thx for your project . It is very fantastic

  • @snowden-IT
    @snowden-IT Рік тому

    Thank you, my friend, that you are not brilliant, but you talk and think that most of those who watch you are professionals. I hope you will take into account that we are new to this field.

  • @narekkay
    @narekkay Рік тому +1

    Wow awesome job t3l3machus ⚡⚡

  • @InfoSecPat
    @InfoSecPat Рік тому

    Love this :)

  • @dcrash_
    @dcrash_ Рік тому +1

    Great work.

  • @astrided94
    @astrided94 Рік тому

    🎉🎉🎉 love the new changes!

  • @_shariq
    @_shariq Рік тому

    Amazing as always ❤❤

  • @spyidonpitikaris7229
    @spyidonpitikaris7229 Рік тому

    Great to see it! :)

  • @HarvestHaven09
    @HarvestHaven09 Рік тому +1

    Welcome back 🔙

  • @ajayshripal4027
    @ajayshripal4027 Рік тому

    Best my friend

  • @Asparuxredsnow
    @Asparuxredsnow Рік тому

    Amazing bro 😍😍

  • @kirtib
    @kirtib Рік тому

    This is so good, and you are one hell of a software developer👍 I hope your employer pays you well my friend!

  • @hpmh7568
    @hpmh7568 6 місяців тому +1

    how do i put hoaxshell payloads into : . ps1 file and just fake to. png or some image file extension, and when they click on it executed and just hide or close the powershell right away

  • @Łynx76
    @Łynx76 Рік тому +1

    When I execute the payload on the target machine windows doesn't flag it or stop it ,and it's like it worked but when I check back on the attacker computer there's no shell session? Does the victim computer also have to have netcat?

  • @chandler-barry
    @chandler-barry Рік тому

    nice

  • @TAWSIF_EDITZ_OFFICIAL
    @TAWSIF_EDITZ_OFFICIAL Місяць тому

    How do I do port forwarding here?

    • @HaxorTechTones
      @HaxorTechTones  Місяць тому

      Hi @TAWSIF_EDITZ_OFFICIAL , port forwarding is something you configure from your router's web interface.
      *Keep in mind that the syntax for certain commands has changed in recent versions. Check the project on github for more info.

  • @NolDBD
    @NolDBD 18 днів тому

    Hi one question... does the upload part only works for other Linux devices? i cant seem to get it to work from a Linux to Windows it even says success but the file does not appear anywhere

  • @lumikarhu
    @lumikarhu Рік тому

    there's a bug in the coolest shell (the cmd one) but let's leave it like that. these who know a little bit of batch will be able to pinpoint this miniscule issue in a heartbeat and those that don't probably shouldn't be using it anyway. wish it was more stable though because i like the idea. gotta try expanding this one template

    • @HaxorTechTones
      @HaxorTechTones  Рік тому

      So, what's the bug mate?

    • @lumikarhu
      @lumikarhu Рік тому

      @@HaxorTechTones I hosted the c2 under my domain with a real cert, not self signed. hence i picked the hoax/https cmd with curl. The payload simply doesn't execute in the current version without a simple modification on windows 10. The problem lies in the iterational part of the payload, i already feel like i said too much. let's not get it signatured too early. it's a byte too short. the easiest way to understand it is to know the difference between pasting the payload into the cmd and launching it out of a bat file - that's how i spotted it. each of the ways of starting it gave me different errors so i pinpointed it rather quickly, but if you still wanna know i insist on different channels of communication

  • @danishkute
    @danishkute 3 місяці тому

    Hi telemachus I want to know if the payload must be on the same network to function?

  • @Chinmoy-bf6cz
    @Chinmoy-bf6cz Рік тому +1

    Dude, your project is great... But I have some issue with villain...I can't jumped into cmd, I am unable to download file and execute file through this shell.. And some commend doesn't work... can you tell me how to solve it... Please reply 🙏... Thank you

  • @philxdes1573
    @philxdes1573 Рік тому

    when i try using it, it doesnt send back any sort of connection or message at all to villain. i send it in powershell and did everything the exact same that you did. Any idea how to fix it?

  • @IvanLarsen-cr4pq
    @IvanLarsen-cr4pq 9 місяців тому +1

    товарищ

  • @ooxoox176
    @ooxoox176 8 місяців тому

    Error parasiong LHOST, Invalid Ip or interface am trying to use ngrok ):

  • @rizkysays
    @rizkysays Рік тому

    Can i run .ps1 script on Kali into Windows Machine with Villain? Cause .ps1 script is detected by Windows Defender on Windows

  • @IllllIIIIIlIlIlllll
    @IllllIIIIIlIlIlllll Рік тому

    Is it possibile to do a persistent shell?🙏

  • @andrewlawrence1328
    @andrewlawrence1328 Рік тому +1

    Why does my netcat tcp reverse shell lose connection after a while without doing anything?
    I managed to establish the connection and after aprox 5 mins it loses connection, why is it doing that?

    • @HaxorTechTones
      @HaxorTechTones  Рік тому +1

      It shouldn't be doing this, never had that issue. You need to provide some info, maybe open an issue on github with screenshots. Does the shell session stop working or does villain mark the connection as lost? Are you sure there's no event occurring that leads to the session loss?

    • @andrewlawrence1328
      @andrewlawrence1328 Рік тому +1

      @@HaxorTechTones ok so I forgot to mention that i am using ngrok and it seems that the problem occurs only when using ngrok, because I don't have this problem inside my LAN.

  • @linkstoamazingstuffs521
    @linkstoamazingstuffs521 Рік тому

    My villain isn't working 😢
    It doesn't get a reverse shell

  • @sergioscolari4190
    @sergioscolari4190 3 місяці тому

    I was wondering.. Can i download files by the victim PC?

  • @theoruiz-hidalgo2110
    @theoruiz-hidalgo2110 7 місяців тому

    Hi ! Do I need to use obf payload in order to use the upload tool ?
    I'm getting denied access response when I'm trying to copy simple texts to my desktop ?

    • @HaxorTechTones
      @HaxorTechTones  7 місяців тому

      Make sure to add the file name to the path you want the file to be uploaded, not only the dir.

    • @theoruiz-hidalgo2110
      @theoruiz-hidalgo2110 7 місяців тому

      @@HaxorTechTones It seems better but still not working,
      when I keep my hard disk name it says : the generic path isn't resolved
      when I just type the path from /users, as you did, it says : non-conforming character (translate from french, hope you will get it :/)

    • @theoruiz-hidalgo2110
      @theoruiz-hidalgo2110 7 місяців тому +1

      Ok just got it !!!
      The problem was that I kept writing the full path, like I was in C:/Users/TheGuyIAm and I kept writing C:/Users/TheGuyIAm/Desktop/TheFileIWant when I should have written /source_path \desktop\TheFileIWant

    • @theoruiz-hidalgo2110
      @theoruiz-hidalgo2110 7 місяців тому

      @@HaxorTechTones And thx ! You're the best !

    • @theoruiz-hidalgo2110
      @theoruiz-hidalgo2110 7 місяців тому

      One last question, I tried connecting to an FTP server using Villain but kept blocking at the connection step, is it normal or ?

  • @DontDont-r8i
    @DontDont-r8i Рік тому

    Hello! What an incredible project! Tell me is there any way to migrate connection to meterpreter?

    • @HaxorTechTones
      @HaxorTechTones  Рік тому

      Hi, thanks! Not yet, working on it. Stay tuned!

  • @alquranalkarim-
    @alquranalkarim- Рік тому

    how can i take a screenshots desktop
    from the target machine

  • @adamouassar1859
    @adamouassar1859 Рік тому

    I need help. After uploading the payload to the powershell it won't establish the connection, it doesn't show the message:"Backdoor session established on ...".Does it only happen to me? Someone help me pls.

    • @philxdes1573
      @philxdes1573 Рік тому

      im having the same issue, have you figured it out?

    • @adamouassar1859
      @adamouassar1859 Рік тому

      @@philxdes1573 The problem was that I had a bad configuration of kali linux in virtual studio code. Try going to the settings of the machine, to the network option and change the first option to bridge adapter.

  • @Alexander-rj8he
    @Alexander-rj8he Рік тому +1

    Hey bro your work is awesome... Can you please tell me how to persistent it.. How can we get connection afer reboot victim pc.. Thank you

    • @HaxorTechTones
      @HaxorTechTones  Рік тому +2

      Hey, thanks! That's kind of complex to pull off. I might make a video about it in the future :)

    • @Alexander-rj8he
      @Alexander-rj8he Рік тому

      @@HaxorTechTones thanks bro😃

  • @osmanali176
    @osmanali176 Рік тому +1

    Hi bro

  • @iN0F
    @iN0F 3 місяці тому

    the backdoor work with php file ?

  • @alimuhamed6084
    @alimuhamed6084 10 місяців тому

    Sir, why can't I upload files?

  • @mohammedrizwan8324
    @mohammedrizwan8324 Рік тому

    how to use persistence? give me answer

  • @SajidQureshi__
    @SajidQureshi__ Рік тому

    does it support the single payload works for many victims as it previously supports only 1 payload 1 victim as far as i know

    • @johnazure
      @johnazure Рік тому

      i dont think so...

    • @HaxorTechTones
      @HaxorTechTones  Рік тому

      You can use TCP socket based reverse shell commands to do that, those are reusable. The hoaxshell ones are one timers

  • @thepilotsparrow
    @thepilotsparrow Рік тому

    Hello! is there a way to download stuff from the victim pc? I tried everything but couldn't maybe I just suck :*)

    • @HaxorTechTones
      @HaxorTechTones  Рік тому +1

      Hi, in an automated manner, like, "download /path/to/file", not yet unfortunately, but the feature will be added in a future update :)

    • @thepilotsparrow
      @thepilotsparrow Рік тому

      ​@@HaxorTechTonesYoooo! You are the best

  • @callduty5564
    @callduty5564 Рік тому +1

    Dude you doing great.. But how can we maintain persistent.. If we don't make persistent..then there is nothing in this tool.. Please tell me how can we maintain persistent

  • @Jamaal_Ahmed
    @Jamaal_Ahmed Рік тому

    Please make a video to port forwarding 🙏

  • @andreasclaudius9076
    @andreasclaudius9076 9 місяців тому

    obfuscate don t work anymore, can you say me tools for this?

  • @SF-eg3fq
    @SF-eg3fq Рік тому

    well done do you accept pull requests?

    • @HaxorTechTones
      @HaxorTechTones  Рік тому

      Hi, thanks! Currently, I don't. kind of figuring out the direction of the project.

  • @FREE_FIRE_CHEATS
    @FREE_FIRE_CHEATS Рік тому +2

    sir port forwarding

  • @ANA_Thike
    @ANA_Thike 4 місяці тому

    bro pls add download option.
    thank you for the tool 💖

  • @number1victory358
    @number1victory358 Рік тому +1

    ok now we need how to bypass antivirus.

  • @osmanali176
    @osmanali176 Рік тому

    Can we download files from the backdoor system?

    • @HaxorTechTones
      @HaxorTechTones  Рік тому

      not yet ¯\_(ツ)_/¯

    • @osmanali176
      @osmanali176 Рік тому

      @@HaxorTechTones ok bro

    • @osmanali176
      @osmanali176 Рік тому

      Can we download files using the shell?

    • @johnazure
      @johnazure Рік тому

      @@osmanali176 you can do it manually from within powershell... you can make a script that uploads files to dropbox using dropbox api... theres a tutorial here youtube.

    • @osmanali176
      @osmanali176 Рік тому

      @@johnazure can you share me the link?

  • @osmanali176
    @osmanali176 Рік тому

    How can we bypass Anti-virus as these payloads are detecting it?

    • @HaxorTechTones
      @HaxorTechTones  Рік тому +1

      The trick is to edit the payload templates and replace the commands with obfuscated versions of them. I'll make a how-to video about it soon.

    • @osmanali176
      @osmanali176 Рік тому

      @@HaxorTechTones thanks bro I am waiting for it😁

  • @hackerworld391
    @hackerworld391 Рік тому

    if victom pc restart will vilain still work plz anwser ??

    • @HaxorTechTones
      @HaxorTechTones  Рік тому

      No, you would have to work on persistence by e.g., injecting a malicious periodically executed task or backdoor a startup service. The content on this channel is for authorized assessments. Don't try weird monkey stuff against machines you do not have permission to test.

    • @hackerworld391
      @hackerworld391 Рік тому

      @@HaxorTechTones i know i just ask and im 14 year im begener in hacking can if a make that file auto run file

  • @jajbinlimbu8278
    @jajbinlimbu8278 Рік тому

    sir, it is still detecting generate powershell. But i like your video.

  • @BlackTeamSec
    @BlackTeamSec Рік тому +1

    buddy you need to add channel tags to get views

  • @BIZLOOK
    @BIZLOOK 10 місяців тому

    It this work over internet by ngrok or something

  • @osvaldopereo4285
    @osvaldopereo4285 Рік тому

    you are amazing!!! How can upload to remote file path with blank spaces? = upload /localpath/text.txt
    emotepath\blank space\text.txt?

  • @relaxingsounds4536
    @relaxingsounds4536 Рік тому

    why am i getting this error when I try to do the same ?
    At line:1 char:1
    + Start-Process $PSHOME\powershell.exe -ArgumentList {$client = New-Obj ...
    + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    This script contains malicious content and has been blocked by your antivirus software.
    + CategoryInfo : ParserError: (:) [], ParentContainsErrorRecordException
    + FullyQualifiedErrorId : ScriptContainedMaliciousContent

    • @HaxorTechTones
      @HaxorTechTones  Рік тому

      Because the payload is getting caught by your anti-virus. Check out this video on how to bypass it -> ua-cam.com/video/grSBdZdUya0/v-deo.html